Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: New Petya Ransomware Spreads via Fake Online Resumes

b2ap3_thumbnail_ransomware_petya_400.jpgNext time you see an unsolicited resume in your email, it’s worth scrutinizing before you just click on it. It could be a nasty new ransomware called Petya.

Petya is a particularly mean-spirited ransomware that hackers use to extort money from their victims. Infection begins with a Windows error, followed by the typical “blue screen of death” reboot, and displays a red skull and crossbones. As the computer restarts, a fraudulent “system check” allows the infection to encrypt the master file table (MFT), so the computer more or less “forgets” where, or even which, files it has.

In addition to doing this, instead of barring access from particular files, Petya locks the user out of their system entirely by overwriting their computer’s master boot record. Once this happens, the computer is rendered useless (you can’t even log in), only displaying a list of demands, an online address to appease those demands in Bitcoin, and finally, a decryption code to regain access to the files.

When the user accesses the payment page, they learn that they have a limited amount of time to purchase their key before the price is doubled--from around an initial cost of .99 Bitcoins, which is equivalent to about $430. While many websites claim that there are commands that will allow the user to skip the lock screen, the MFT will still be encrypted, and the files still useless. Additionally, there’s no guarantee that the decryption key provided upon payment will even solve the problem, potentially leaving the user short $430 and all of their digital files.

Business owners and human resource representatives need to be particularly alert, considering that the preferred method of dispersement for Petya is via email, specifically disguised as what would appear to be a message from someone seeking a job. The message contains a hyperlink that directs to a Dropbox containing a “resume” (an antivirus program-blinding Trojan containing Petya) and a stock photo. With these tactics, Petya had been plaguing German businesses, with no telling when it may spread.

Fortunately, a programmer has come up with a fix to remove Petya without paying any ransom after his father-in-law’s system was targeted. Thanks to some purported carelessness by the authors of this malware, the encryption is crackable. To do so, however, isn’t such a simple task - it requires a second, uninfected hard drive, for starters. So while Petya has been cracked, it is still better to not be a target in the first place.

So how does one avoid such an attack? Mainly vigilance, assisted by Total Tech Care’s security solutions that help detect and block questionable sources. Call 866-348-2602 for more information about products to keep your company safe from the cyber pirates flying a digital skull and bones.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Windows 10 Passwords Virtualization Saving Money Holiday Social Media Gadgets Tech Term Chrome Automation Managed IT Services Managed Service Microsoft Office Computers Facebook Cybercrime Artificial Intelligence Operating System BYOD Internet of Things Mobile Device Management Networking Health IT Support Wi-Fi Hacking Office 365 Covid-19 Telephone Systems Information Technology Alert Information Managed Service Provider Remote Spam Router BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Applications Mobile Computing App History Law Enforcement Application Data Breach Human Resources Password Big Data Money Remote Monitoring Encryption How To Office Tips Government Training Data Storage Patch Management Blockchain Private Cloud VPN Paperless Office Managed IT Remote Computing Apps Mobile Office Flexibility Google Drive Marketing WiFi IT solutions Entertainment Wireless Website Avoiding Downtime Budget Gmail Vulnerability Windows 7 Word Settings Servers Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Mouse HaaS Data Security Safety Managed Services Display Data Protection HIPAA Sports Redundancy Risk Management Keyboard Hacker Employee/Employer Relationship RMM The Internet of Things Lithium-ion battery USB Conferencing Scam Telephone System Staff Software as a Service Save Time Firewall Machine Learning Connectivity Remote Work Virtual Reality Vendor Management Cleaning Apple Social End of Support User Error Education Physical Security Meetings Vendor Cryptocurrency Retail Hard Drives Computer Accessories Remote Workers Instant Messaging Value Robot Excel PDF Processor Spam Blocking Electronic Medical Records Biometrics Comparison Virtual Desktop Proactive IT Hard Drive CES Hiring/Firing Printer Best Practice Bluetooth DDoS YouTube Black Market Business Technology Content Management Computing Access Control SharePoint Virtual Assistant Document Management Authentication Business Intelligence IT Consultant Customer Service Solid State Drive Wireless Technology Downtime Audit Environment Worker How to Humor IT Management Digital Signage Fax Server Data storage Botnet Update Automobile IT Plan SaaS Procurement Google Docs Computing Infrastructure Workplace Strategy Unsupported Software Net Neutrality Identity Theft Going Green Network Congestion Help Desk Charger Printing eWaste Compliance Augmented Reality OneNote Computer Care Battery Fraud Current Events Shadow IT Telephony Managed Services Provider Virus Legal Remote Worker Samsung Database Unified Threat Management Internet Exlporer Wearable Technology Skype Windows Server 2008 R2 Recycling Customer relationships Wiring Notifications Practices Data loss Managing Stress Running Cable Outlook Manufacturing Amazon Web Services Leadership Troubleshooting Email Best Practices IT Assessment Cache Safe Mode Start Menu Criminal Memory Cameras Loyalty Relocation Computer Tips GDPR Managed IT Service Hosted Computing Screen Mirroring Security Cameras Frequently Asked Questions Biometric Security Online Shopping Books Virtual CIO OneDrive Wireless Internet Peripheral File Sharing Mobile Windows 10s Video Games Worker Commute Digital Security Cameras Camera Using Data Inventory Cast Specifications Tip of the week 5G Evernote webinar Experience Science Emergency Copiers Wire Quick Tip Professional Services Public Cloud Travel Employer Employee Relationship Printer Server Scalability Assessment Business Owner Ergonomics Printers Smartwatch Millennials Distributed Denial of Service Windows Server 2008 OLED Wireless Charging Customer Relationship Management NarrowBand Development Smart Office PCI DSS Tools Virtual Machine Analyitcs Search Programming Television iPhone 2FA Virtual Private Network Fiber Optics Employee Workforce Cabling Cables Messaging Policy Hypervisor Public Computer Files Dark mode Project Management Trend Micro Nanotechnology Antivirus Telecommuting Regulations Default App Cortana Windows 8 Transportation Chromecast SMS Procedure Saving Time Digital Signature IT service Computer Fan Rootkit Colocation dark theme Warranty Uninterrupted Power Supply Shopping Google Search IT Infrastructure Google Apps Workers Consultant Tablet Benefits AI HVAC Monitor FinTech Analysis Domains FENG Bing Analytics IBM Administrator Social Network Devices Enterprise Content Management IaaS Flash Investment Maintenance Best Available Smart Technology Reputation Employees MSP Streaming Media Employee/Employer Relationships Accountants WIndows 7 Bloatware ISP Credit Cards Supercomputer Content Windows 365 Microchip Tech Support Thought Leadership Software Tips Video Conferencing Password Management Sync ROI Password Manager Emails Tablets Techology Laptop Customers Sales Bitcoin Shortcuts Multi-Factor Security Entrepreneur Cryptomining Audiobook Point of Sale Search Engine Personal Twitter Supply Chain Management NIST Business Mangement Shortcut Netflix Two Factor Authentication Touchpad Windows Media Player Monitoring Batteries Smart Tech Root Cause Analysis User Trending Cost Management PowerPoint Amazon Social Networking Knowledge Politics Music Advertising Windows 8.1 Digitize Addiction HBO

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code